Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest

8Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It has become a significant research direction to resist cyberattacks through traffic identification technology. Traditional traffic identification technology is often based on network port or feature matching, which has become inefficient in the increasingly complex network environment. Nowadays, the malicious cyberattacks usually encrypt their traffic to escape the traditional traffic identification, and the most common encryption method is the SSL/TLS encryption. In response to this phenomenon, this paper proposes an encrypted malicious traffic identification method based on the random forest, which uses features based on packet information, time, TCP Flags field, and application layer payload information. We designed the technology and application framework to ensure the success of the experiment and collected a large amount of SSL/TLS encrypted traffic as datasets. Benefit from model optimization by parameter adjusting, the experimental results showed that final model had highly accurate and predictive ability.

Cite

CITATION STYLE

APA

Fang, Y., Xu, Y., Huang, C., Liu, L., & Zhang, L. (2020). Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest. In Advances in Intelligent Systems and Computing (Vol. 1027, pp. 99–115). Springer. https://doi.org/10.1007/978-981-32-9343-4_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free